#DdOS

2025-12-15

High confidence DDoS attack detected targeting Iraq 🇮🇶 government administration sector, specifically the Ministry of Planning. #CyberThreats #DDoS #CyberSecurity

2025-12-14

A high-confidence DDoS attack has targeted EDF Entreprises in France 🇫🇷 within the Energy & Utilities sector. Stay vigilant. #DDoS #EnergySecurity #CyberThreat

2025-12-14

Lampang Kanlayanee School in Thailand 🇹🇭 has experienced a high-confidence DDoS attack targeting the education sector. #DDoS #CyberSecurity #ThreatIntel

2025-12-14

High confidence of a DDoS attack targeting the Government Administration sector in France 🇫🇷, specifically aimed at the prefect of the Guadeloupe region. #DDoS #CyberThreat #GovernmentSecurity

2025-12-14

A high-confidence DDoS attack has targeted France 🇫🇷, specifically affecting the government administration sector and impacting la poste's digital identity services. #DDoS #CyberThreat #CyberSecurity

2025-12-14
2025-12-14

Как на практике реагировать на DDoS-атаку в корпоративной сети

Практический разбор реакции на DDoS-атаку в корпоративной сети: что делать в первые часы, как избежать паники и сохранить работу бизнеса.

habr.com/ru/articles/976504/

#информационная_безопасность #информационная_безопасность_и_сети #сети_администрирование #ддос #ddosатака #ddos #ddosзащита #ddosзащита_для_самых_маленьких

2025-12-14

A high-confidence DDoS attack has targeted the French government 🇫🇷, specifically its multichannel payment API in the Government Administration sector. #DDoS #CyberSecurity #ThreatIntel

2025-12-13

High confidence of a DDoS attack targeting Thailand 🇹🇭's Ministry of Foreign Affairs, a key government administration sector. #DDoS #CyberThreat #GovernmentSecurity

2025-12-13

High confidence of a DDoS attack targeting Thailand 🇹🇭 government administration, specifically the budget bureau. #DDoS #ThreatIntel #CyberSecurity

2025-12-13

A high-confidence DDoS attack has targeted the prefecture of Bouches-du-Rhône 🇫🇷, focusing on government administration sectors. #DDoS #CyberSecurity #ThreatIntel

2025-12-12

High confidence of a DDoS attack targeting government administration in France 🇫🇷, specifically Province Nord. #CyberThreat #DDoS #CyberSecurity

2025-12-12

High confidence DDoS attack targeting government administration in France 🇫🇷, specifically the prefect of Haute-Savoie. #DDoS #CyberThreats #GovernmentSecurity

2025-12-12

I need you right now, Pedophiles,” reads an Oct. 27, 2020 email from Trump’s campaign team, signed by Trump, and sent to Epstein’s email address, “jeeproject@yahoo.com.”

Read , digest and sh*t

#epstein #epsteinfiless #photo

#trump #DDOS

Drip drip drip , we know it will all come out.

2025-12-12

Under this reward offer, RFJ is offering up to 💵 $2,000,000 for information on individuals associated with CARR aka Z-Pentest #usa #dss #rfj #online #ddos #threats [ rewardsforjustice.net/rewards/ ] #informatique

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2025-12-11

get in losers, we’re gamifying everything now

> “NoName published a daily leaderboard of volunteers who launched the most attacks… and paid top-ranking volunteers in cryptocurrency”

justice.gov/opa/pr/justice-dep

#Russia #FSB #GRU #putin #vladimirPutin #uspol #cybersecurity #infosec #noName #ukpol #eupol #botnet #DDoS #ukraine #ukrainewar #crypto #cryptocurrency #litecoin #bitcoin #gamification

Gamified manipulation to motivate pro-Russian
cyberattacks

Investigations by national authorities identified NoName057(16) as an ideological criminal network that has been
seen to profess support to the Russian Federation and, in the context of the Russian war of aggression against
Ukraine, has been linked to numerous DDoS cyberattacks. During such attacks, a website or online service is
flooded with traffic with the objective of overloading it and rendering it unavailable. In addition to the activities of the
network, estimated at over 4 000 supporters, the group was also able to construct their own botnet made up of
several hundred servers, used to increase the attack load.

To share calls to action, tutorials, updates, and to recruit volunteers, the group leveraged pro-Russian channels,
forums, and even niche chat groups on social media and messaging apps. Volunteers often invited friends or
contacts from gaming or hacking forums, forming small recruitment circles. These actors used platforms like DDoSia
to simplify technical processes and provide guidelines, enabling new recruits to become operational quickly.
Participants were also paid in cryptocurrency, which incentivised sustained involvement and attracted opportunists.
Mimicking game-like dynamics, regular shout-outs, leader boards, or badges provided volunteers with a sense of
status. This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of
Miguel Afonso Caetanoremixtures@tldr.nettime.org
2025-12-10

"The Justice Department announced two indictments in the Central District of California charging Ukrainian national Victoria Eduardovna Dubranova, 33, also known as Vika, Tory, and SovaSonya, for her role in conducting cyberattacks and computer intrusions against critical infrastructure and other victims around the world, in support of Russia’s geopolitical interests. Dubranova was extradited to the United States earlier this year on an indictment charging her for her actions supporting CyberArmyofRussia_Reborn (CARR). Today, Dubranova was arraigned on a second indictment charging her for her actions supporting NoName057(16) (NoName). Dubranova pleaded not guilty in both cases, and is scheduled to begin trial in the NoName matter on Feb. 3, 2026 and in the CARR matter on April 7, 2026.

As described in the indictments, the Russian government backed CARR and NoName by providing, among other things, financial support. CARR used this financial support to access various cybercriminal services, including subscriptions to distributed denial of service-for-hire services. NoName was a state-sanctioned project administered in part by an information technology organization established by order of the President of Russia in October 2018 that developed, along with other co-conspirators, NoName’s proprietary distributed denial of service (DDoS) program.

“Politically motivated hacktivist groups, whether state-sponsored like CARR or state-sanctioned like NoName, pose a serious threat to our national security, particularly when foreign intelligence services use civilians to obfuscate their malicious cyber activity targeting American critical infrastructure as well as attacking proponents of NATO and U.S. interests abroad,” said First Assistant U.S. Attorney Bill Essayli for the Central District of California."

justice.gov/opa/pr/justice-dep

#CyberCrime #CyberSecurity #Russia #StateHacking #DDoS #USA #Hacktivism

Scripter :verified_flashing:scripter@social.tchncs.de
2025-12-10

Riesiges Botnetz attackiert mit beispielloser Datenflut
glm.io/202900?n #Cybercrime #Botnetz #Aisuru #DDOS

2025-12-10

@abuse_ch - So it took not even a few days until the first #DDoS capable malware leveraged the #CVE. Not a bit surprise, but concerning nonetheless. Especially, since those devices are likely more powerful traffic generators than the usual #IoT device.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst